The Samba-Bugzilla – Attachment 3980 Details for
Bug 5144
Kernel crashes on mount
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
patch to fix oopses
ssetup-oops.patch (text/plain), 935 bytes, created by
shirishpargaonkar@gmail.com
on 2009-03-05 21:54:04 UTC
(
hide
)
Description:
patch to fix oopses
Filename:
MIME Type:
Creator:
shirishpargaonkar@gmail.com
Created:
2009-03-05 21:54:04 UTC
Size:
935 bytes
patch
obsolete
>diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c >index 5f22de7..b234407 100644 >--- a/fs/cifs/sess.c >+++ b/fs/cifs/sess.c >@@ -228,7 +228,7 @@ static int decode_unicode_ssetup(char **pbcc_area, int bleft, > > kfree(ses->serverOS); > /* UTF-8 string will not grow more than four times as big as UCS-16 */ >- ses->serverOS = kzalloc(4 * len, GFP_KERNEL); >+ ses->serverOS = kzalloc((4 * len) + 2 /* trailing null */, GFP_KERNEL); > if (ses->serverOS != NULL) > cifs_strfromUCS_le(ses->serverOS, (__le16 *)data, len, nls_cp); > data += 2 * (len + 1); >@@ -241,7 +241,7 @@ static int decode_unicode_ssetup(char **pbcc_area, int bleft, > return rc; > > kfree(ses->serverNOS); >- ses->serverNOS = kzalloc(4 * len, GFP_KERNEL); /* BB this is wrong length FIXME BB */ >+ ses->serverNOS = kzalloc((4 * len) + 2 /* trailing null */, GFP_KERNEL); > if (ses->serverNOS != NULL) { > cifs_strfromUCS_le(ses->serverNOS, (__le16 *)data, len, > nls_cp);
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 5144
: 3980